STANDING TALL. Cyberbullying: Protect Your Sons and Daughters FACTS:

Size: px
Start display at page:

Download "STANDING TALL. Cyberbullying: Protect Your Sons and Daughters FACTS:"

Transcription

1 FACTS: Up to 42% of teens report being bullied on-line STANDING TALL Cyberbullying: Protect Your Sons and Daughters 16% of adolescents report they cyberbully others Disrespect and namecalling occur most. However, over 12% of students report being physically threatened on -line LESS THAN 15% OF VIC- TIMS TELL AN ADULT INSIDE THIS ISSUE: Cyberbullying by Proxy Cyber Ethics at Home Saving Screenshots Web Resources Dealing with Cyberbullies! Is Your Child a Cyberbully? Google Yourself! The National Crime Prevention Council defines cyberbullying as when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person. Cyberbullying may be as simple as repeatedly sending text messages to someone who has requested no further contact. However, it can quickly escalate to name calling and ridicule, to threats, or to posting inappropriate text or images in an effort to humiliate and demean another. Cyberbulling is different from more traditional forms of face-to-face bullying familiar to most parents. Before the explosion of technology, the home provided a sanctuary for children. You might have been pushed around at school or given a hard time in the neighborhood. However, once you entered your home, you were safe. Now a teenager s cell phone has become a permanent appendage on the body and computers are located in children s bedrooms. Kids activities on-line and over their cells are not supervised by parents to the extent that face-to-face interactions are. This means bullies have potential access to any target, any place, any time. Bullies are different too. Bullies now can hide behind a computer screen and seemingly remain anonymous while targeting others. This assumed anonymity actually can encourage teens, who would never bully another face-to-face, to vent their hostilities and bully others online. As a parent, you wonder: What can I do? I am not technically savvy! The good news is that you don t need to be a computer guru to protect your children. The same things you do to protect children every day can be used to protect children when using the Internet and other communication devices. In real life, parents talk to their children; they know where they are going and what they are doing. They set limits, like curfews, and monitor their children s behavior to make sure that they are following house rules. The same is true for Internet life. Know where your children are going online and what they are doing. Know their friends and set limits. Make sure your computer is located in a welltraveled, public place in your home so you can monitor your child s actions and reactions. Most cyber bullying occurs outside of the school building. You are your child s first line of defense. You are the protector. This issue of Standing Tall will assist you in making sure you are armed with the knowledge you need to keep your children safe. The Mission of Polk County Public Schools is to provide a high quality education for all students..

2 Typical Cyber Bully Roles PAGE 2 Cyberbullies typically feel justified in their behavior and actually think cyberbullying is funny. Nearly 20% of teens that cyberbully do so by pretending to be someone else in order to acquire embarrassing or personal information from another. In addition, 17% of teens who were cyberbullied report that someone posted lies about them online and another 10% report that someone posted unflattering pictures of them online without permission. While every situation is unique, cyberbullies can usually be categorized into one of four loosely defined roles. Vengeful Angels These teens cyberbully as a means to protect themselves or another they perceive to be a target. These individuals are not unlike the mavericks of the Old West who take justice into their own hands instead of reporting other aggressors to adults who can help. Power-Hungry These teens are not unlike traditional bullies. Cyberbullying is just a new frontier to them and is used as a means to feel powerful and control others through the use of fear. These teens feed on audience attention. Mean Girls Many times, girls bully others by spreading rumors and causing other girls to be ostracized or to face social ridicule. They thrive on the attention and drama that the situation creates. This is done in an effort to gain power and control over others. These types of bullies can act individually or as a collective group behind a computer screen. The Internet provides an avenue for this type of behavior. Inadvertent These individuals do not think of themselves as bullies. They may react to messages received, forward an unflattering message about someone to another, or play along and not realize the seriousness of their behavior. Adapted with permission from WiredKids, Inc. stopcyberbullying.org and wiredsafety.org Cyberbullying by Proxy Cyberbullying by proxy is when a bully impersonates a victim so that it appears the victim is actually the one causing the problem. Of surveyed teens, 13% learned that a cyberbully was pretending to be them while communicating with another. The most typical way a cyberbully by proxy attack occurs is when the bully uses the password of the target to access her account, pretends to be the target and sends rude and hateful messages to everyone on the target s friend or buddy list. The target s friends then get angry with the target because of the messages and take it out on her. Warning or Notify Wars are when kids fraudulently click the warning or notify buttons of their IM or chat screens or and alert the ISP or service provider that the target has done something that violates one of the service agreement rules. If a target receives enough warnings or notifications, they can be denied service by their provider and can lose their account. Although it can be verified by the provider if a warning is justified, by that time, the bully hopes to have angered the target enough to where he writes something rude or hateful about the bully and then the bully has proof that a violation occurred. In addition, if the cyberbully can make it look like the target has done something wrong, the victim s parents may be contacted, and the parents may actually unwittingly punish the target! Sometimes, cyberbullying by proxy can be much more serious. Armed with personal contact information of the target, cyberbullies can either post information about or pose as a target in hate group chat rooms or on bulletin boards trying to incite individuals who are members of these groups to respond to the target in threatening ways. If you feel your child has been victimized through the use of hate or deviant groups, law enforcement should be contacted at once. Make sure you save any pertinent information to show authorities. Adapted with permission from WiredKids, Inc. stopcyberbullying.org and wiredsafety.org

3 STANDING TALL PAGE 3 Teaching Cyber Ethics In Your Home Set Up Your Space! Put the computer in a frequently traveled part of the home and no computers, including laptops, should be allowed in bedrooms. Make it a rule: if you walk by and your child changes screens or shuts off the monitor, they are automatically grounded for the weekend. Limit the amount of time exposed to the Internet and schedule black-out times for Internet and cell phone use (Example: no use after 10:00 p.m.) Talk To Your Child! Talk with your teen about the dangers of the Internet. While the Internet can be a great source of information, it also has inherent risks. Tell your teen to never post personal information about themselves or others online, including their name, address, phone number, school, or team/extra-curricular activities. At the same time, you shouldn t post personal information online either. Parents MySpace accounts can reveal information that should only be in a grandmother s brag book and that information can put you and your family at risk. Let your child know that they are NEVER to arrange to meet someone in-person that they only know online that fifteen-year-old boy from Daytona could really be a 45-year-old, bald man with a van. Learn what teens are doing online. Visit websites that your child frequents. If you don t know anything about Facebook or MySpace or any other social networking site, ask your teen for help. Have them help you set up your own page. They are usually more than happy to show you how technically smart they are. Find out what to look out for (extremely large friends list, truth box, etc.). Teach children to recognize cyberbullying and let them know that they are not to engage in cyberbullying. This means that your child should not post or text anything which could be considered cyberbullying and should not forward any or text which would continue a bullying pattern. Make sure all social networking accounts are marked friends only. This means you have to approve a person to be added to your account to see your page. Friends should only include people known to your child in real life. Make sure students know that NOTHING posted on the Internet or texted is PRIVATE, even if it is marked so. It only takes one download by a friend of your private information and another posting to make it public for all of the world to see. Know what your child is writing on his/her social networking pages. The purpose of social networking sites is just that to social network. If your child wants their written information to be private, buy them an old-fashioned diary with a key. Make sure they know that cyberbullies can be traced, located, and punished. In fact, cyberbullies actually provide the best evidence against themselves in written word. Talk to your teen about how to handle cyberbullying: 1. Tell your child to immediately contact you if they are being bullied and not to respond to the bully. 2. Help your teen record the bullying incident. Take a screenshot of the screen in which your child was threatened by a bully. (Directions for screenshots can be found on Page 4.) 3. Tell your child never to seek revenge on the bully. Don t type when you are frustrated and angry. 4. Tell your teen to keep passwords secret from their friends a friend today is an enemy tomorrow, is a friend again the third day. Adapted from Stop Cyberbullying Before it Starts, National Crime Prevention Council

4 STANDING TALL Is Your Child A Target? Less than 11% of teens tell a parent if they are the target of cyberbullying. Parents have to be vigilantly alert to behavioral signs of bullying. Your child may be the target of a cyberbully if he/she: Unexpectedly stops using the computer Becomes nervous or anxious when an instant message appears on the computer or a new text appears on his cell phone Seems uneasy about going to school or outside of the home Appears to be anxious, angry, or depressedafter using the computer Is reluctant to disclose what she is doing on the computer Shows signs of withdrawal from friends, family members and social activities. Adapted from Cyberbullying Website Resources Taking Screenshots Saving Evidence PAGE 4 A screenshot is an image captured by the computer to record the visible items displayed on the monitor ( It is an invaluable, yet easily used tool to document cyberbullying. PC/Windows Directions for Taking and Saving a Screen Shot 1. Have the content you wish to photograph clearly displayed on your monitor. 2. Press the PrtScn button on your keyboard. It is typically located in the top right corner of your keyboard. 3. Open a new document in Microsoft Word (or an equivalent). 4. Right-click your mouse and select paste from the menu that pops up. 5. A copy should appear in the document. Then type in any other relevant information, such as online nicknames, addresses, date, time, and anything else which you might later need to document the incident. 6. Save the document onto your computer hard drive in a location you will remember. Apple Directions for Taking and Saving a Screen Shot 1. Have the content you wish to photograph clearly displayed on your monitor. 2. Press Apple (Command) Key + Shift +3. This captures the entire desktop to a file on the desktop as picture #. 3. You can also be more selective with what content you photograph by pressing Apple (Command) Key +Shift +4. This allows you to use your mouse to select a specific part of your desktop for capture. When your pointer turns into a cross, hold down the mouse button and drag to select the part of the screen you want to capture. When you release the mouse button a snapshot will be captured of that part of the screen. Press Esc to release the screen capture feature and switch back to the normal cursor arrow. Reprinted with permission from stopcyberbullying.org cyberbullying.org stopbullyingnow.hrsa.gov cyberbully.org wiredsafety.com netsmartz.org netbullies.com isafe.org safeteens.com blogsafety.com onguardonline.gov ic3.gov (Internet Crime Complaint Center) ncpc.org (Nat ional Crime Prevention Council)

5 STANDING TALL PAGE 5 Sexting Sexting is the exchange of nude or semi-nude pictures by cell phone, and it is becoming more common among teens. In a national study sponsored by Cosmo Girl and the National Campaign to Prevent Teen and Unplanned Pregnancy, it was noted that while 75% of teens report that sexting is a bad idea that can have negative impacts, 20% posted or sent semi-nude or nude picture of themselves to another. While teens are aware that these photos can be made public, many may feel that theirs won t be shared because they only send them to trustworthy people. However, 1 in 4 girls and 1 in 3 boys report that they have had provocative pictures shared with them that were not originally sent for them to see. The more provocative the information or photo, the more likely it is going to be seen by others. It s also important for parents to understand that there is an expectation of hooking up in real life that accompanies racy texts and s. Because texting is less conspicuous and easier to hide from parents than a verbal phone call, you may not have an overwhelming amount of clues that it is happening. Therefore, talk to your teen about sexting no matter if you suspect it or not. Discuss long-term consequences, family values, and house rules. Dealing with Cyberbullies Parents Have Power! Save the Evidence. Save all of the s, texts, screenshots, etc. Save everything that indicates a bullying incident occurred. Identify the Cyberbully. This may be more difficult than you think since the cyberbully may impersonate someone else or it could be a case of cyberbullying by proxy. If you can identify the cyberbully, immediately block them from your site or . If you don t know who is behind the bullying contact your ISP provider to identify the source or contact a company which specializes in this type of information retrieval such as wiredsafety.org. They have volunteers who will help you track down the person behind the bullying. Tell the Cyberbully to Stop. Most kids who are cyberbullied report that they tell the person to stop. This may not be effective if not supported by a parent, and you may need to also tell the person to stop. A simple, non-emotional reply indicating that you will either go to their parents or the police if the bullying continues should suffice. Contact the Bully s Parents. Don t approach them face-to-face. Send them a certified letter including all of the material you have collected, the repeated attempts to tell the bully to stop, and let them know that if it continues, you will be contacting law enforcement. File a Complaint. Cyberbullying violates the Terms of Agreement of most websites, ISPs and mobile phone companies. In your complaint, include the harmful messages and link information to harmful material posted on the Internet. Keep a copy of all communications. Follow these directions when filing complaints: If your child is being cyberbullied through , contact the ISP of the cyberbully. The ISP is in the address. Example: MSN is the ISP in this address: safetynow@msn.com. If the material is posted to a website, go to the website and file a complaint by clicking on the Contact Us area. If the cyberbully is using a cell phone, trace the number and contact the company. Contact Your School. If the cyberbully used school computers to threaten others, it is a given that they can be punished by the school. In addition, the school can intervene with formal discipline if the offending text or posted material that was created off school campus causes the disruption of a target s educational process. Contact Law Enfocement. Cyberbullying which involves threats of violence, coercion, obscene or harassing text messages, harassment or stalking, hate crimes, or creating or sending sexually exploitative pictures should be reported to law enforcement. Adpated from Cyberbullying and Cyberthreat: Responding to the Challenge of Online Social Aggression, Threats, and Distress, by N.E. Willard, Champaign, IL, Research Press.

6 Is Your Child A Cyberbully? Your Child Cyberbullied Someone Else Parents must be vigilant when observing their own children for bullying behaviors. Cyberbullying hurts everyone, and perpetrators may be held criminally responsible. A child may be a cyberbully if: He quickly switches off the monitor, minimizes the screen, switches screens, or closes programs when you walk past. She uses the computer after the rest of the family has gone to sleep, when there is less supervision. He becomes very angry if you do not allow him to use the computer. She laughs excessively when using the computer. He is reluctant to disclose what he is doing on the computer. She uses multiple online accounts, or an account that is not her own. Adapted from What is Circulating on the Web about You? Google Yourself! Did you know that if you have given your listed telephone number out online, someone maybe able to access that information and actually get a map leading straight to your home? If you want to find out what is out there about you and/or your children, here are some quick search ideas which will start you on your cyber journey. Go to the Google search engine at Type in your full name in quotes (Example: Alfred Smith ) and click search. Everything which lists that name will be displayed. Repeat the search with your address, IM screen names, nicknames, and telephone numbers always making sure to put the search in quotes. Next, google your children following the same steps listed above. Either you have discovered or another has reported to you that your child is engaging in cyberbully behavior. Take action. If you do not, you could be held civilly liable for any damage done to the target, which may mean money out of your pocket. In addition, some cyberbullying can result in criminal charges. Use the following tips to help you address your child s behavior: 1. Discuss with your child the potential consequences of his behavior and tell him not to seek revenge against the target or the person who reported it. 2. Immediately install monitoring software and monitor all internet activities of your child. 3. Tell your child that she is only to use the internet at school and at home. If you find out she has accessed the internet anywhere else, tell her a more severe punishment will occur. 4. Monitor all cell phone activity, as well as internet activity, and limit both internet and cell phone use. Adpated from Cyberbullying and Cyberthreat: Responding to the Challenge of Online Social Aggression, Threats, and Distress, by N.E. Willard, Champaign, IL, Research Press. If you find information posted about a child of yours under the age of thirteen, notify the webmaster at the website and request it be removed. The Children s On-line Privacy Protection Act (COPPA) requires that the information be removed immediately. However, if it involves individuals over the age of thirteen, information removal may prove difficult. Start with the webmaster of the site. Usually, the webmaster can be contacted at webmaster@[the web site name/url]. For example, Polk Schools webmaster is webmaster@polk-fl.net. In the request, you need to include the URL of the page that includes the personal information you want removed, the exact information you want removed, and a statement indicating you are that person or that person s parent. Copy and paste the information from the site into your and yourself a copy too. Wait a week, and if you have heard nothing, send a follow-up including all information previously sent, as well as the date when the original was sent. If another week passes with no response, you can a computer safety watchdog group such as Wired Safety, privacy@wiredsafety.org for further assistance. If you find a site designed to harass or target you or members of your family, immediately involve law enforcement. Adapted with permission from WiredKids, Inc. stopcyberbullying.org and wiredsafety.org

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 ) Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

Chapter 3. Online Bullying

Chapter 3. Online Bullying Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

Cyberbullying. How common is cyberbullying?

Cyberbullying. How common is cyberbullying? Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

CyberbullyNOT Student Guide to Cyberbullying

CyberbullyNOT Student Guide to Cyberbullying CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

Whether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives.

Whether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives. Cyberbullying Whether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives. By Ted Feinberg and Nicole Robey Ted Feinberg is the assistant executive director

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Parent Guide to Cyber bullying and Cyber threats

Parent Guide to Cyber bullying and Cyber threats School Address: 4450 S Mendenhall Rd Memphis, TN 38141 Tel: (901) 367 7814 Fax: (901) 367 7816 www.sememphis.org MEMPHIS SCHOOL OF EXCELLENCE Parent Guide to Cyber bullying and Cyber threats Young people

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

Their stories are tragic. A new chapter starts now. now.

Their stories are tragic. A new chapter starts now. now. ! Their stories are tragic. A new chapter starts now. now.! Bully is a movie that tells powerful stories about children and their families dealing with extreme pain and tragic consequences related to bullying.

More information

Cyberbullying: What Parents Can Do to Protect Their Children

Cyberbullying: What Parents Can Do to Protect Their Children Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

TAVISTOCK COLLEGE POLICIES & PROCEDURES

TAVISTOCK COLLEGE POLICIES & PROCEDURES TAVISTOCK COLLEGE POLICIES & PROCEDURES TITLE: ANTI CYBER BULYING POLICY MODEL POLICY STATEMENT This is not a Local Authority model policy Local changes have / have not been made to the model policy by

More information

A Parents Guide to. 2014 ConnectSafely.org

A Parents Guide to. 2014 ConnectSafely.org A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence)

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) The prohibition against hazing, dating violence, harassment, intimidation or bullying is publicized in student handbooks and in the publications

More information

Cyberbullying. Welcome!

Cyberbullying. Welcome! Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also

More information

Common Facebook issues

Common Facebook issues Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young

More information

Cyber Safety For Parents

Cyber Safety For Parents Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting

More information

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages. Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications

More information

e-rate toolkit Cyberbullying: Crossing the Line

e-rate toolkit Cyberbullying: Crossing the Line e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

A Parents' Guide to. Snapchat. 2013 ConnectSafely.org

A Parents' Guide to. Snapchat. 2013 ConnectSafely.org A Parents' Guide to Snapchat 2013 ConnectSafely.org Top 5 Questions Parents Have About Snapchat 1. Why do kids love Snapchat? They love the spontaneity of it. It s been (rightfully) drummed into their

More information

National Cybersecurity Awareness Campaign Families Presentation

National Cybersecurity Awareness Campaign Families Presentation National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security

More information

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really

More information

School Policy Regarding Computer Use, Technology and Internet Access

School Policy Regarding Computer Use, Technology and Internet Access School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school

More information

Empowering young people to be safe on the Internet. Information for parents, teachers and community members

Empowering young people to be safe on the Internet. Information for parents, teachers and community members Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information

More information

A Parents' Guide to. 2014 ConnectSafely.org

A Parents' Guide to. 2014 ConnectSafely.org A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram

More information

Cyber Safety Handbook 2014

Cyber Safety Handbook 2014 Cyber Safety Handbook 2014 Mission & Vision Statements Mission To provide students with an excellent, all-round education in a Christian environment. Cricos No: 01645K Vision Woodcroft College aspires

More information

Outsmarting On-line Predators. Christina Kilbourne

Outsmarting On-line Predators. Christina Kilbourne Outsmarting On-line Predators Christina Kilbourne Some Surprising Stats 26% believe their parents would be concerned if they knew what they were doing on-line over half have given out personal information

More information

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

www.xxxchurch.com Online Predators & Strangers

www.xxxchurch.com Online Predators & Strangers www.xxxchurch.com Online Predators & Strangers When children go online, they have direct access to their friends and family members, but they also may come into contact with complete strangers. Through

More information

Guideline on Windows 7 Parental Controls

Guideline on Windows 7 Parental Controls CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius

More information

Online Safety How to Protect Yourself and Your Family

Online Safety How to Protect Yourself and Your Family Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing

More information

Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty

Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty Nancy Willard, M.S., J.D., Director Center for Safe and Responsible Internet Use URL: http://cyberbully.org or http://csriu.org

More information

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper Cyber-bullying Cyber-bullying: A Digital Epidemic White Paper What is Cyber-bullying? The past two decades have witnessed a virtual explosion in new technology that has been eagerly embraced by adolescents

More information

Teen Online & Wireless Safety Survey

Teen Online & Wireless Safety Survey Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications

More information

FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766

FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766 FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY www.cheezo.org 303-271-6766 A Message from District Attorney Peter Weir One of the priorities of the District Attorney s Office

More information

Website. cybersafekids.com.au WELCOME TO CYBERIA. Queensland University of Technology. 2007. really doing online?

Website. cybersafekids.com.au WELCOME TO CYBERIA. Queensland University of Technology. 2007. really doing online? WELCOME TO CYBERIA ONLINE WORLD OF DIGITAL NATIVE Website Robyn Treyvaud robynt@cse.edu.au cybersafekids.com.au CURRENT BOOKMARKS http://del.icio.us/rtreyvaud Queensland University of Technology. 2007

More information

Cyberbullying Policy Considerations for Boards

Cyberbullying Policy Considerations for Boards July 2007 Cyberbullying Policy Considerations for Boards Schools have long had to deal with bullying among students, including hitting, teasing, name-calling, intimidation, harassment and social exclusion.

More information

Bullying 101: Guide for Middle and High School Students

Bullying 101: Guide for Middle and High School Students Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org

More information

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the

More information

Guidelines for Preventing and Dealing with Bullying Issues

Guidelines for Preventing and Dealing with Bullying Issues Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

Wisconsin Anti-Bullying Center

Wisconsin Anti-Bullying Center Patrick Evans, M.S. CESA 7 - Project Management Consultant Green Bay, Wisconsin Certified Trainer Wisconsin Emergency Management Multi-Hazard Emergency Planning for Schools Writer, Editor, Contributor,

More information

Social Networking Sites A Predator s Playground?

Social Networking Sites A Predator s Playground? Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY What is Twitter? Twitter is one of the leading tools for connecting users with bite-sized pieces of information and status updates. Each message

More information

Bullying. Take Action Against. stealing money. switching seats in the classroom. spreading rumors. pushing & tripping

Bullying. Take Action Against. stealing money. switching seats in the classroom. spreading rumors. pushing & tripping switching seats in the classroom stealing money Take Action Against Bullying spreading rumors pushing & tripping U.S. DEPARTMENT OF HEALTH & HUMAN SERVICES Substance Abuse and Mental Health Services Administration

More information

Parent Guide to Cyberbullying and Cyberthreats

Parent Guide to Cyberbullying and Cyberthreats Parent Guide to Cyberbullying and Cyberthreats Young people have fully embraced the Internet as both an environment and a tool for socializing. Via the Internet and other technologies, they send e-mail,

More information

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life.

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life. Internet Safety Kit A wake-up call for safer surfing online for the young people in your life. From the Polly Klaas Foundation Includes free download of Wired With Wisdom, an Internet safety program for

More information

UNSUPERVISED AND ONLINE

UNSUPERVISED AND ONLINE UNSUPERVISED AND ONLINE Effective Identification of Negative Online Behavior and Strategies for Creating a Family Prevention Plan Follow us on: Contact us at: notmykid.org info@notmykid.org 602.652.0163

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

Staying Safe.....on social media and online

Staying Safe.....on social media and online Staying Safe.....on social media and online What is this guide about This booklet is about how to keep safe when you are using social media and the internet. Some people get called names, are bullied or

More information

Parent Guide to Cyberbullying and Cyberthreats

Parent Guide to Cyberbullying and Cyberthreats APPENDIX K Parent Guide to Cyberbullying and Cyberthreats Young people have fully embraced the Internet as both an environment and a tool for socializing. Via the Internet and other technologies, they

More information

Girls & Cyber- bullying

Girls & Cyber- bullying MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

Youth Protection Training

Youth Protection Training B O Y S C O U T S O F A M E R I C A Youth Protection Training For Volunteer Leaders and Parents Facilitator s Guide The Boy Scouts of America deeply appreciates your leadership in facilitating this session

More information

Class 2: Manage Your Digital Footprint. Student Handbook

Class 2: Manage Your Digital Footprint. Student Handbook Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal

More information

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences

More information

HOW TO STAY SAFE. Smartphones

HOW TO STAY SAFE. Smartphones HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these

More information

Safety Tips for Social Networking

Safety Tips for Social Networking Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and

More information

THE HALL SCHOOL Whole School Anti-Bullying Policy

THE HALL SCHOOL Whole School Anti-Bullying Policy THE HALL SCHOOL Whole School Anti-Bullying Policy AUTHOR: Paul Chapman Policy ratified by: SLT Date of publication: September 2015 Date of next review: September 2016 Governor responsible for policy: Patrick

More information

FIRBANK GRAMMAR SCHOOL

FIRBANK GRAMMAR SCHOOL FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...

More information

Parent / Guardian Consent for Technology Use in Schools

Parent / Guardian Consent for Technology Use in Schools Parent / Guardian Consent for Technology Use in Schools Our school uses computers and other mobile devices in the classroom to help increase student motivation and achievement. We will use laptop sets,

More information

A Parents' Guide to Cyberbullying: Addressing Online Social Cruelty

A Parents' Guide to Cyberbullying: Addressing Online Social Cruelty A Parents' Guide to Cyberbullying: Addressing Online Social Cruelty Young people have fully embraced the Internet as both an environment and a tool for socializing. They create their own Web sites, post

More information

Bullying Prevention. When Your Child Is the Victim, the Bully, or the Bystander

Bullying Prevention. When Your Child Is the Victim, the Bully, or the Bystander Bullying Prevention When Your Child Is the Victim, the Bully, or the Bystander What Is Bullying? Bullying is not a conflict or a fight. Bullying is physical, verbal, or emotional abuse that is deliberate,

More information

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)

More information

safety internet safety for adults

safety internet safety for adults safety internet safety for adults our mission The mission of The USAA Educational Foundation is to help consumers make informed decisions by providing information on financial management, safety concerns

More information

Social Media and Cyber Safety

Social Media and Cyber Safety Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant andrew@justbesafe.com Social Media and Cyber Safety Our instructor today

More information

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National

More information

e-safety for Parents

e-safety for Parents e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology

More information

FAIRFIELD AREA SCHOOL DISTRICT

FAIRFIELD AREA SCHOOL DISTRICT No. 249 FAIRFIELD AREA SCHOOL DISTRICT SECTION: PUPILS TITLE: BULLYING / CYBERBULLYING ADOPTED: REVISED: August 11, 2015 249. BULLYING / CYBERBULLYING 1. Purpose 2. Definitions The Board is committed to

More information

E-Safety and Acceptable Use Policy

E-Safety and Acceptable Use Policy E-Safety and Acceptable Use Policy This policy has been written in consultation with pupils and staff so that they understand that there are dangers associated with Internet use, and they know what behaviour

More information

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone? SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

WHOLE SCHOOL ANTI-BULLYING POLICY

WHOLE SCHOOL ANTI-BULLYING POLICY 130 High Road, Buckhurst Hill, Essex IG9 5SD Telephone number: 0208 504 1133 WHOLE SCHOOL ANTI-BULLYING POLICY 1 Persons responsible: The Head Teacher, in consultation with the Directors, the Governing

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

How To Protect Children From Abuse

How To Protect Children From Abuse CREATING A NETWORK OF PREVENTION AND PROTECTION To report suspected abuse of a minor, call the Pennsylvania Child Abuse Hotline 1-800-932-0313 If you suspect child abuse by clergy, church officials, church

More information

E-safety: Protecting your child online. Information for parents

E-safety: Protecting your child online. Information for parents E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools

More information

Hallett Cove South Primary School Communications/Network Use Policy

Hallett Cove South Primary School Communications/Network Use Policy Hallett Cove South Primary School Communications/Network Use Policy The Communications/Network Use Policy ( Policy ) sets out the rights and responsibilities for computer and communications network users

More information

Lessons for Teens: Risky Internet and Social Networking

Lessons for Teens: Risky Internet and Social Networking Lesson Plan # 4 Online/Electronic Lure Presenter Overview: Most teens regularly and safely interact online with people they don t know via social networking, media and gaming sites. Although news organizations

More information

Predators will use information obtained from children to gain trust and friendship

Predators will use information obtained from children to gain trust and friendship 1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and

More information

Cyberbullying. Understanding and Addressing Online Cruelty. Students Handouts and Supporting Materials for Teachers

Cyberbullying. Understanding and Addressing Online Cruelty. Students Handouts and Supporting Materials for Teachers Cyberbullying Understanding and Addressing Online Cruelty Students Handouts and Supporting Materials for Teachers Elementary Level Lesson: Building a Foundation for Safe and Kind Online Communication Resources

More information